共 16 条
[2]
Amir Y., 1998, CNDS984 JOHNS HOPK U
[3]
Ateniese G., 1998, 5th ACM Conference on Computer and Communications Security, P17, DOI 10.1145/288090.288097
[4]
Blake-Wilson S, 1999, LECT NOTES COMPUT SC, V1556, P339
[5]
Burmester M., 1995, Advances in Cryptology - EUROCRYPT '94. Workshop on the Theory and Application of Cryptographic Techniques. Proceedings, P275, DOI 10.1007/BFb0053443
[7]
Fekete A., 1997, Proceedings of the Sixteenth Annual ACM Symposium on Principles of Distributed Computing, P53, DOI 10.1145/259380.259422
[8]
Gunther C.G., 1989, Advances in Cryptology-Eurocrypt, P29
[9]
Just M., 1996, Advances in Cryptology - ASIACRYPT'96 International Conference on the Theory and Applications of Cryptology and Information Security. Proceedings, P36, DOI 10.1007/BFb0034833
[10]
Kim Y., 2004, ACM Transactions on Information and Systems Security, V7, P60, DOI 10.1145/984334.984337